Hacker And The Fed cover image

Search Engine Vulnerabilities, Ghost Tokens, Anna Kournikova

Hacker And The Fed

00:00

Google's Ghost Token Attack

An attacker could get an application accepted. Probably changes its capabilities or exactly what the application does. Attackers would then immediately re-hide the application from the victim once it got access to a new access token. To maintain persistence, the attack loop must be executed periodically before the pending deletion project is purged.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app